+ All Categories
Home > Documents > SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20...

SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20...

Date post: 25-Mar-2018
Category:
Upload: lamkhanh
View: 238 times
Download: 13 times
Share this document with a friend
43
SailPoint IdentityIQ Common Criteria Security Target ST Version: 2.0 August 27, 2017 SailPoint 11305 Four Points Drive Building 2, Suite 100 Austin, TX 78726 Prepared By: Cyber Assurance Testing Laboratory 900 Elkridge Landing Road, Suite 100 Linthicum, MD 21090
Transcript
Page 1: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

SailPoint IdentityIQ

Common Criteria Security Target

ST Version: 2.0

August 27, 2017

SailPoint 11305 Four Points Drive

Building 2, Suite 100

Austin, TX 78726

Prepared By:

Cyber Assurance Testing Laboratory

900 Elkridge Landing Road, Suite 100

Linthicum, MD 21090

Page 2: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

1 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Table of Contents

1 Security Target Introduction ................................................................................................................. 6

1.1 ST Reference ................................................................................................................................. 6

1.1.1 ST Identification ................................................................................................................... 6

1.1.2 Document Organization ........................................................................................................ 6

1.1.3 Terminology .......................................................................................................................... 7

1.1.4 Acronyms .............................................................................................................................. 7

1.1.5 References ............................................................................................................................. 8

1.2 TOE Reference .............................................................................................................................. 9

1.3 TOE Overview .............................................................................................................................. 9

1.4 TOE Type .................................................................................................................................... 11

2 TOE Description ................................................................................................................................. 12

2.1 Evaluated Components of the TOE ............................................................................................ 12

2.2 Components and Applications in the Operational Environment ................................................. 12

2.3 Physical Boundary ...................................................................................................................... 12

2.3.1 Excluded from the Evaluated Configuration ....................................................................... 13

2.4 Logical Boundary ........................................................................................................................ 13

2.4.1 Enterprise Security Management ........................................................................................ 14

2.4.2 Security Audit ..................................................................................................................... 14

2.4.3 Identification and Authentication ........................................................................................ 14

2.4.4 Security Management ......................................................................................................... 14

2.4.5 Protection of the TSF .......................................................................................................... 15

2.4.6 TOE Access ........................................................................................................................ 15

2.4.7 Trusted Path/Channels ........................................................................................................ 15

3 Conformance Claims .......................................................................................................................... 15

Page 3: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

2 | P a g e

Booz Allen Hamilton – CATL / SailPoint

3.1 CC Version .................................................................................................................................. 15

3.2 CC Part 2 Conformance Claims .................................................................................................. 15

3.3 CC Part 3 Conformance Claims .................................................................................................. 15

3.4 PP Claims .................................................................................................................................... 16

3.5 Package Claims ........................................................................................................................... 16

3.6 Package Name Conformant or Package Name Augmented ........................................................ 16

3.7 Conformance Claim Rationale .................................................................................................... 16

4 Security Problem Definition ............................................................................................................... 17

4.1 Threats......................................................................................................................................... 17

4.2 Organizational Security Policies ................................................................................................. 17

4.3 Assumptions ................................................................................................................................ 17

4.4 Security Objectives ..................................................................................................................... 18

4.4.1 TOE Security Objectives .................................................................................................... 18

4.4.2 Security Objectives for the Operational Environment ........................................................ 19

4.5 Security Problem Definition Rationale ....................................................................................... 19

5 Extended Components Definition ....................................................................................................... 20

5.1 Extended Security Functional Requirements .............................................................................. 20

5.2 Extended Security Assurance Requirements .............................................................................. 20

6 Security Functional Requirements ...................................................................................................... 21

6.1 Conventions ................................................................................................................................ 21

6.2 Security Functional Requirements Summary.............................................................................. 21

6.3 Security Functional Requirements .............................................................................................. 23

6.3.1 Class ESM: Enterprise Security Management .................................................................... 23

6.3.2 Class FAU: Security Audit ................................................................................................. 24

6.3.3 Class FIA: Identification and Authentication ..................................................................... 26

6.3.4 Class FMT: Security Management ..................................................................................... 27

6.3.5 Class FPT: Protection of the TSF ....................................................................................... 29

6.3.6 Class FTA: TOE Access ..................................................................................................... 29

6.3.7 Class FTP: Trusted Path/Channels ...................................................................................... 30

6.4 Statement of Security Functional Requirements Consistency .................................................... 30

7 Security Assurance Requirements ...................................................................................................... 31

Page 4: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

3 | P a g e

Booz Allen Hamilton – CATL / SailPoint

7.1 Class ADV: Development ........................................................................................................... 31

7.1.1 Basic Functional Specification (ADV_FSP.1) .................................................................... 31

7.2 Class AGD: Guidance Documentation ....................................................................................... 32

7.2.1 Operational User Guidance (AGD_OPE.1) ........................................................................ 32

7.2.2 Preparative Procedures (AGD_PRE.1) ............................................................................... 33

7.3 Class ALC: Life Cycle Support .................................................................................................. 33

7.3.1 Labeling of the TOE (ALC_CMC.1) .................................................................................. 33

7.3.2 TOE CM Coverage (ALC_CMS.1) .................................................................................... 34

7.4 Class ATE: Tests ......................................................................................................................... 34

7.4.1 Independent Testing - Conformance (ATE_IND.1) ........................................................... 34

7.5 Class AVA: Vulnerability Assessment ....................................................................................... 35

7.5.1 Vulnerability Survey (AVA_VAN.1) ................................................................................. 35

8 TOE Summary Specification .............................................................................................................. 36

8.1 Enterprise Security Management ................................................................................................ 36

8.1.1 ESM_EAU.2 ....................................................................................................................... 36

8.1.2 ESM_EID.2 ......................................................................................................................... 36

8.1.3 ESM_ICD.1 ........................................................................................................................ 36

8.1.4 ESM_ICT.1 ......................................................................................................................... 37

8.2 Security Audit ............................................................................................................................. 38

8.2.1 FAU_GEN.1: ...................................................................................................................... 38

8.2.2 FAU_STG_EXT.1: ............................................................................................................. 38

8.3 Identification and Authentication ................................................................................................ 38

8.3.1 FIA_AFL.1: ........................................................................................................................ 38

8.3.2 FIA_SOS.1: ......................................................................................................................... 38

8.3.3 FIA_USB.1: ........................................................................................................................ 39

8.4 Security Management ................................................................................................................. 39

8.4.1 FMT_MOF.1: ...................................................................................................................... 39

8.4.2 FMT_MTD.1: ..................................................................................................................... 40

8.4.3 FMT_SMF.1: ...................................................................................................................... 40

8.4.4 FMT_SMR.1: ...................................................................................................................... 40

8.5 Protection of the TSF .................................................................................................................. 40

Page 5: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

4 | P a g e

Booz Allen Hamilton – CATL / SailPoint

8.5.1 FPT_APW_EXT.1: ............................................................................................................. 40

8.5.2 FPT_SKP_EXT.1:............................................................................................................... 41

8.6 TOE Access ................................................................................................................................ 41

8.6.1 FTA_SSL.3: ........................................................................................................................ 41

8.6.2 FTA_SSL.4: ........................................................................................................................ 41

8.6.3 FTA_TAB.1: ....................................................................................................................... 41

8.7 Trusted Path/Channels ................................................................................................................ 41

8.7.1 FTP_ITC.1: ......................................................................................................................... 41

8.7.2 FTP_TRP.1: ........................................................................................................................ 42

Table of Figures

Figure 1-1: TOE Boundary ........................................................................................................................... 9

Figure 1-2: ESM PP context for the TOE ................................................................................................... 10

Table of Tables

Table 1-1: Customer Specific Terminology .................................................................................................. 7

Table 1-2: CC Specific Terminology ............................................................................................................ 7

Table 1-3: Acronym Definition .................................................................................................................... 8

Table 2-1: Evaluated Components of the TOE ........................................................................................... 12

Table 2-2: Evaluated Components of the Operational Environment .......................................................... 12

Table 2-3: Operational Environment System Requirements ...................................................................... 13

Table 4-1: TOE Threats .............................................................................................................................. 17

Table 4-2: TOE Organization Security Policies.......................................................................................... 17

Table 4-3: TOE Assumptions ..................................................................................................................... 18

Table 4-4: TOE Objectives ......................................................................................................................... 19

Table 4-5: TOE Operational Environment Objectives................................................................................ 19

Table 6-1: Security Functional Requirements for the TOE ........................................................................ 22

Table 6-2: Auditable Events ....................................................................................................................... 25

Table 6-3: Management Functions by Role ................................................................................................ 28

Page 6: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

5 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Table 6-4: Management of TSF Data ......................................................................................................... 28

Page 7: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

6 | P a g e

Booz Allen Hamilton – CATL / SailPoint

1 Security Target Introduction

This chapter presents the Security Target (ST) identification information and an overview. An ST

contains the Information Technology (IT) security requirements of an identified Target of Evaluation

(TOE) and specifies the functional and assurance security measures offered by the TOE.

1.1 ST Reference

This section provides information needed to identify and control this ST and its Target of Evaluation.

This ST targets exact conformance with the following Protection Profile (PP):

Standard Protection Profile for Enterprise Security Management Identity and Credential

Management, version 2.1

1.1.1 ST Identification

ST Title: SailPoint IdentityIQ Common Criteria Security Target

ST Version: 2.0

ST Publication Date: August 27, 2017

ST Author: Booz Allen Hamilton

1.1.2 Document Organization

Chapter 1 of this document provides identifying information for the ST and TOE as well as a brief

description of the TOE and its associated TOE type.

Chapter 2 describes the TOE in terms of its physical boundary, logical boundary, exclusions, and

dependent Operational Environment components.

Chapter 3 describes the conformance claims made by this ST.

Chapter 4 describes the threats, assumptions, objectives, and organizational security policies that apply to

the TOE.

Chapter 5 defines extended Security Functional Requirements (SFRs) and Security Assurance

Requirements (SARs).

Chapter 6 describes the SFRs that are to be implemented by the TSF.

Chapter 7 describes the SARs that will be used to evaluate the TOE.

Chapter 8 provides the TOE Summary Specification, which describes how the SFRs that are defined for

the TOE are implemented by the TSF.

Page 8: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

7 | P a g e

Booz Allen Hamilton – CATL / SailPoint

1.1.3 Terminology

This section defines the terminology used throughout this ST. The terminology used throughout this ST

is defined in Table 1-1 and 1-2. These tables are to be used by the reader as a quick reference guide for

terminology definitions.

Term Definition

Administrator The subset of organizational users who have authorizations to manage the TSF.

Entitlement A privilege assigned to an account on a target system that is configured through

provisioning.

Identity Store The repository in the Operational Environment where organizational users are defined

along with their credential data and identity attributes.

Organizational User A user defined in the identity store that has the ability to interact with assets in the

Operational Environment.

Provisioning

The process of configuring the settings and/or account information of environmental

assets based on the privileges that different types of organizational users need on them

to carry out their organizational responsibilities.

Self-Service The process by which an end user can initiate a password reset or a request for elevated

privileges.

User In an IdentityIQ context, is synonymous with organizational user.

Table 1-1: Customer Specific Terminology

Term Definition

Authorized

Administrator

The claimed Protection Profile defines an Authorized Administrator role that is

authorized to manage the TOE and its data. For the TOE, this is considered to be any

user with the ‘admin’ role.

Security

Administrator Synonymous with Authorized Administrator.

Trusted Channel An encrypted connection between the TOE and a system in the Operational

Environment.

Trusted Path An encrypted connection between the TOE and the application an Authorized

Administrator uses to manage it (web browser, terminal client, etc.).

User In a CC context, any individual who has the ability to manage TOE functions or data.

Table 1-2: CC Specific Terminology

1.1.4 Acronyms

The acronyms used throughout this ST are defined in Table 1-3. This table is to be used by the reader as

a quick reference guide for acronym definitions.

Acronym Definition

AD Active Directory

ADSI Active Directory Services Interface

ESM Enterprise Security Management

FIPS Federal Information Processing Standards

GUI Graphical User Interface

HTTPS Hypertext Transfer Protocol Secure

ICF Identity Connector Framework

Page 9: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

8 | P a g e

Booz Allen Hamilton – CATL / SailPoint

ICM Identity and Credential Management

JDBC Java Database Connectivity

JNDI Java Naming and Directory Interface

JRE Java Runtime Environment

LDAP Lightweight Directory Access Protocol

MS Microsoft

OS Operating System

PP Protection Profile

SMTP Simple Mail Transfer Protocol

SPML Service Provisioning Markup Language

SysAdmin System Admin

TLS Transport Layer Security

TOE Target of Evaluation

TSF TOE Security Functions

Table 1-3: Acronym Definition

1.1.5 References

[1] Standard Protection Profile for Enterprise Security Management Identity and Credential

Management, version 2.1 (ICM PP)

[2] Common Criteria for Information Technology Security Evaluation – Part 1: Introduction and

general model, dated September 2012, version 3.1, Revision 4, CCMB-2012-009-001

[3] Common Criteria for Information Technology Security Evaluation – Part 2: Security

functional components, dated September 2012, version 3.1, Revision 4, CCMB-2012-009-

002

[4] Common Criteria for Information Technology Security Evaluation – Part 3: Security

assurance components, dated September 2012, version 3.1, Revision 4, CCMB-2012-009-003

[5] Common Methodology for Information Technology Security Evaluation – Evaluation

Methodology, dated September 2012, version 3.1, Revision 4, CCMB-2012-009-004

[6] NIST Special Publication 800-56B Recommendation for Pair-Wise Key Establishment

Schemes Using Integer Factorization Cryptography, August 2009

[7] NIST Special Publication 800-38A Recommendation for Block Cipher Modes of Operation,

December 2001

[8] NIST Special Publication 800-90A Recommendation for Random Number Generation Using

Deterministic Random Bit Generators, January 2012

[9] FIPS PUB 140-2 Federal Information Processing Standards Publication Security

Requirements for Cryptographic Modules May 25, 2001

[10] FIPS PUB 180-3 Federal Information Processing Standards Publication Secure Hash

Standard (SHS) October 2008

[11] Federal Information Processing Standards Publication The Keyed-Hash Message

Authentication Code (HMAC) July 2008

[12] SailPoint IdentityIQ Administration Guide version 7.1

[13] SailPoint IdentityIQ User’s Guide version 7.1

[14] SailPoint IdentityIQ Direct Connectors Administration and Configuration Guide version

7.1

[15] SailPoint IdentityIQ Installation Guide version 7.1

Page 10: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

9 | P a g e

Booz Allen Hamilton – CATL / SailPoint

[16] SailPoint_IdentityIQ_Capabilities.xls

1.2 TOE Reference

The TOE is IdentityIQ version 7.1.

1.3 TOE Overview

IdentityIQ (also referred to as the TOE) is a governance-based Identity and Access Management (IAM)

software solution. It integrates compliance management and provisioning in a unified solution that

leverages a common identity governance framework. IdentityIQ provides a variety of IAM processes that

include automated access certifications, policy management, access request and provisioning, password

management and identity intelligence. The evaluated configuration of IdentityIQ includes licenses for

both the Compliance Manager and Lifecycle Manager portions of IdentityIQ.

The following figure depicts the TOE boundary:

Windows 2012 Server

IdentityIQ

TLS

Oracle DBActive

Directory

Web Browser

Legend

TOE Subsystem

Environment Object

E1 TLS

E2 E3

TLS

E1 External Interface

Apache Tomcat

JRE

MS .NetFramework

Active Directory

E4

TLS

Figure 1-1: TOE Boundary

As illustrated in Figure 1-1, the IdentityIQ is the lone component of the evaluation. There are 4 secure

interfaces that are external to the TOE. The data that traverses these interfaces is protected by TLS. This

secure protocol is provided by the Operational Environment.

All management activities are completed through the web browser that connects to the Administrative

GUI. All administrators attempting to access the TOE have to provide valid identification and

authentication credentials. This channel is secured using HTTPS that is provided by the Apache Tomcat

using its OpenSSL module.

Page 11: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

10 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Policy data, enterprise user data, and IdentityIQ user data is stored in an external database. In the

evaluated configuration, the database used is Oracle 11g. This connection is secured using a TLS

protected channel between the environmental JRE’s JDBC and the Oracle database.

IdentityIQ connects to Active Directory to perform authentication of enterprise users and administrative

users to IdentityIQ. This connection occurs over a TLS protected channel between the environmental

JRE's JNDI and the environmental Active Directory server.

IdentityIQ connects to Active Directory to perform compliance checks (aka "certifications") by reading

the enforced policies and enterprise user data that is stored within Active Directory. The compliance

check is done to identify any conflicts between the Active Directory instances. The TOE performs

provisioning by writing updates to this data on the Active Directory instances based upon configuration

updates made in the TOE by administrators. This connection occurs over a TLS protected channel

between the environmental MS .NET Framework's ADSI and the environmental Active Directory server.

The following figure, taken from the ICM PP, shows the reference architecture for an identity and

credential management product:

Other ESM

Components

Assignment

Manager

Target of Evaluation

IT Environment

TOE of another ESM PP

LEGEND

Identity and Credential

Management

Audit

Data

Identity Data

Credential

Data

Attribute Data

Access

Control

Policy

Management

Authentication

Server

Secure

Configuration

Management

Audit Server

Figure 1-2: ESM PP context for the TOE

In general, the following correspondence can be seen between Figure 1-2 above and the TOE diagram

shown in Figure 1-1

Identity and Credential Management – the TOE

Attribute Data, Credential Data, Identity Data – Active Directory store

Audit Data – Oracle Database

Other ESM Components – endpoint systems

Page 12: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

11 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Figure 1-2 was derived from the conceptual diagram presented in the ICM PP with some minor

differences. These differences do not impact the ability of the TOE to claim exact conformance with the

ICM PP. They are as follows:

The TOE does not interface with an ESM Audit Server, ESM Authentication Server, or ESM

Secure Configuration Management product since these Protection Profiles have not been

published as of the publication of this ST.

In the evaluated configuration, the TOE is expected to interface with existing organizational data

stores rather than introducing its own so these are part of the Operational Environment and not

the TSF.

The environmental components that the TSF is expected to provision are general organizational

assets and not explicitly ESM products. For example, the TSF can assign an individual a certain

set of privileges on an operating system or manage some attributes of the individual that are

defined in an organizational data store. However, if another ESM product uses data from this

organizational data store to enforce its own TSF (e.g. another product derives its administrator

login and privileges from Active Directory attributes), the TSF may implicitly manage the

behavior of this product by managing the organizational user attributes that govern its behavior.

1.4 TOE Type

The TOE type for IdentityIQ is Enterprise Security Management, and more specifically identity and

credential management. The TOE is a software application that is used to associate an organization’s

computer system users with role and privilege information based on their position within the organization.

This concept of correlating the attributes of an individual with permissions assigned to their account(s) on

IT resources can be understood as identity management. Additionally, the TSF provides measures to

govern a user’s authentication credential (password), including the ability to change this credential and

the ability to effectively revoke it by changing the status of the associated account. These capabilities can

collectively be understood as identity and credential management. This facilitates Enterprise Security

Management by providing more effective and centralized control over what kinds of users have what

access to what kinds of resources within the organization.

Page 13: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

12 | P a g e

Booz Allen Hamilton – CATL / SailPoint

2 TOE Description

This section provides a description of the TOE in its evaluated configuration. This includes the physical

and logical boundaries of the TOE.

2.1 Evaluated Components of the TOE

The following table describes the TOE components in the evaluated configuration:

Component Definition

IdentityIQ

The identity and credential management software application. The evaluated

configuration of IdentityIQ includes licenses for both the Compliance Manager and

Lifecycle Manager portions of IdentityIQ.

Table 2-1: Evaluated Components of the TOE

2.2 Components and Applications in the Operational Environment

The following table lists components and applications in the environment that the TOE relies upon in

order to function properly:

Component Definition

Active Directory Stores enterprise user data and policies for the operational environment. Also

serves as an authentication store for the TOE.

Application Server Apache Tomcat application server that is used to host the IdentityIQ software as

well as the GUI.

Database

Stores a variety of configuration, operation, and audit data for the TOE. In the

evaluated configuration, the TOE will use Oracle 11g for its database. The

connection to the database is required in order for the TOE to function.

Server

Physical system on which the IdentityIQ software is installed. The physical system

is comprised of a Microsoft Windows Server 2012 OS, Microsoft .NET

Framework, Apache Tomcat Application Server and JRE.

Web Browser The interface that is used to access the IdentityIQ Web GUI. In the evaluated

configuration the GUI will be managed via Internet Explorer, version 10

Table 2-2: Evaluated Components of the Operational Environment

2.3 Physical Boundary

The physical boundary of the TOE includes the IdentityIQ software that is installed on top of the Apache

Tomcat application server. The TOE does not include the hardware or operating systems of the systems

on which it is installed. It also does not include the third-party software which is required for the TOE to

run. The following table lists the software components that are required for the TOE’s use in the

evaluated configuration. These Operational Environment components are expected to be patched to

include the latest security fixes for each component.

Component Requirement

Server OS Windows Server 2012

OS Type 64-bit

Application Server Apache Tomcat 7.0

Database Oracle 11g R1

Authentication Store Windows Server 2012 R2 Active Directory

Page 14: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

13 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Table 2-3: Operational Environment Software Requirements

In addition to the server requirements, a web browser is required for any system used to administer the

TOE. In the evaluated configuration, the TOE was tested using Internet Explorer 10 and the compatibility

of other browsers was not assessed.

2.3.1 Excluded from the Evaluated Configuration

The following list contains Operational Environment software that is supported by the TOE but is not

included or tested in the evaluated configuration:

Operating Systems

• IBM AIX 6.1 and 7.1

• Red Hat Enterprise Linux 7.1 and 7.2

• Oracle Linux (Using RHL Kernal Mode) 7.1 and 7.2

• SuSE Linux Enterprise Server 10 and 11

• Solaris 10 and 11

• Windows Server 2008 R2

• Windows Server 2012 R2

Databases

• IBM DB2 10.5

• MySQL 5.6 and 5.7

• Microsoft SQL Server 2014 and 2016

• Oracle 11g R2 and 12c

Application Servers

• Apache Tomcat 8.0

• Oracle WebLogic 12c Release 2 (12.1.2.x) and 12c R2 (12.2.x)

• IBM WebSphere 8.5.x

• JBoss Application Server 6.4 and 7.0

Java Platform

• Sun, Oracle or IBM JDK 7 and 8

Enterprise User Stores

All other enterprise user stores and their associated connectors are excluded from the evaluation. (In the

evaluated configuration, Active Directory will be the only enterprise user store.)

2.4 Logical Boundary

The TSF is comprised of several security features. Each of the security features identified belongs to one

of several general categories, as identified below.

Page 15: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

14 | P a g e

Booz Allen Hamilton – CATL / SailPoint

1. Enterprise Security Management

2. Security Audit

3. Identification and Authentication

4. Security Management

5. Protection of the TSF

6. TOE Access

7. Trusted Path/Channels

2.4.1 Enterprise Security Management

The TOE performs enterprise user authentication using Active Directory as well as its own authentication

mechanisms within the Operational Environment. IdentityIQ requires each user to enter valid

identification in the form of a username and authentication in the form of a password to gain access to the

TOE.

IdentityIQ uses connectors that are provided by the Operational Environment to communicate with third-

party ESM products. In the evaluated configuration, IdentityIQ connects to Active Directory using the

ADSI connector. The TOE will read and directly manage user data as well as configuration information,

such as policy data, from any connected Active Directory. The TOE will also push user data to any

instance of Active Directory to allow enterprise users to be centrally managed and address any conflicts

of user data throughout the enterprise.

2.4.2 Security Audit

The TOE generates audit records of its behavior and administrator activities. Audit data includes date,

time, event type, subject identity, and other data as required. Audit data is written to a remote Oracle 11g

database. The communication between the TOE and the remote database is secured using TLS that is

provided by the JRE’s JDBC that resides in the Operational Environment.

2.4.3 Identification and Authentication

When an administrator authenticates to the TOE, the TOE will associate the username with a principal.

The principal, along with the capabilities, rights, and dynamic scopes determine the access that the

administrator will have while logged into the TOE.

The TOE provides mechanisms to reduce the likelihood of unauthorized access. The TOE is able to lock

out an administrative account after a specific number of unsuccessful authentication attempts. This setting

is defaulted to lockout users after five failed authentication attempts but is configurable by an

administrator. Password complexity, history, length, and lifetime can be configured by administrators.

These security parameters are used to reduce the likelihood of a successful brute force attack to gain

unauthorized access to the system.

2.4.4 Security Management

The TOE is managed by authorized administrators using a web GUI. All administrative actions are

performed via the web GUI. The TOE uses capabilities to control user access to functionality within the

product. Users or a group of users can be assigned to one or more of the 27 out-of-the-box capabilities.

Page 16: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

15 | P a g e

Booz Allen Hamilton – CATL / SailPoint

The TOE also allows administrators to create or modify capabilities and assign them to users or groups of

users.

2.4.5 Protection of the TSF

In the evaluated configuration, the TOE requests the JRE to encrypt administrator credentials before

being sent to the Operational Environment’s Oracle database. The TOE does not store any cleartext

password data in memory and there are no credentials stored locally on the TOE. Similarly, the answers

to user security questions (used if the user has forgotten their password) are stored in an encrypted format

in the Oracle database. In the evaluated configuration, the TOE does not store any secret or private keys

and thus, there is no mechanism to disclose this information.

2.4.6 TOE Access

The TOE can display a warning banner prior to allowing any administrative actions to be performed. In

the event that the maximum timeout value for inactivity has been reached, the TOE will terminate the

remote session. A user can also terminate their own session by selecting the logout button.

2.4.7 Trusted Path/Channels

The TOE’s evaluated configuration enforces secure communication between the TOE and IT entities in

the operational environment by using the Operational Environment’s JNDI, ADSI, and JDBC installed on

the local system. These trusted channels transfer TOE data, enterprise user data, and IdentityIQ

administrator data to and from IT entities within the Operational Environment. When users log on to the

TOE via a web GUI, a trusted path is established and it is secured using HTTPS that is provided by

Apache Tomcat using its OpenSSL module.

3 Conformance Claims

3.1 CC Version

This ST is compliant with Common Criteria for Information Technology Security Evaluation, Version 3.1

Revision 4 September 2012.

3.2 CC Part 2 Conformance Claims

This ST and Target of Evaluation (TOE) is Part 2 extended to include all applicable NIAP and

International interpretations through 27 August 2017.

3.3 CC Part 3 Conformance Claims

This ST and Target of Evaluation (TOE) is Part 3 conformant to include all applicable NIAP and

International interpretations through 27 August 2017.

Page 17: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

16 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Note that this evaluation also includes evaluation assurance activities that are defined in the

claimed Protection Profile that has augmented the CEM and are not considered to be alterations to

Part 3.

3.4 PP Claims

This ST claims exact compliance to the following Protection Profile:

Standard Protection Profile for Enterprise Security Management Identity and Credential

Management, version 2.1 [ESM_ICM PP]

3.5 Package Claims

The TOE claims exact compliance to a Protection Profile that is conformant with CC Part 3. The TOE

claims following “architectural variations” SFRs that are defined in the appendices of the claimed PP:

FIA_AFL.1

FIA_SOS.1

FTA_SSL.3

FTA_SSL.4

FMT_MTD.1

This does not violate the notion of exact compliance because the PP specifically indicates these as

allowable options and provides both the ST author and evaluation laboratory with instructions on how

these claims are to be documented and evaluated.

3.6 Package Name Conformant or Package Name Augmented

This ST claims exact compliance to a Protection Profile. The ST is conformant to the claimed package.

3.7 Conformance Claim Rationale

The ICM PP states the following: “This protection profile focuses on the aspect of ESM that is

responsible for enforcing identity and credential management. Identity and Credential Management

products will generate and issue credentials for subjects that reside within the enterprise. They will also

maintain the organizational attributes that are associated with these subjects. By providing a means for

subjects to validate their identities and determining the relationship these subjects have to the enterprise,

an Identity and Credential Management product is able to support enterprise accountability and access

control.”

The TOE is a software application that allows for the centralized enrollment of users which includes the

issuing and maintenance of credentials, association of user accounts with identity attributes, and

definition of privileges based on these associated attributes. As such, it is consistent with the definition of

an identity and credential management product as stated in the ICM PP. Therefore, the conformance

claim is appropriate.

Page 18: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

17 | P a g e

Booz Allen Hamilton – CATL / SailPoint

4 Security Problem Definition

4.1 Threats

This section identifies the threats against the TOE. These threats have been taken from the ICM PP.

Threat Threat Definition

T.ADMIN_ERROR An administrator may unintentionally install or configure the TOE

incorrectly, resulting in ineffective security mechanisms.

T.EAVES A malicious user could eavesdrop on network traffic to gain unauthorized

access to TOE data.

T.FALSIFY A malicious user may falsify the TOE’s identity and transmit false data

that purports to originate from the TOE to provide invalid data to the

ESM deployment.

T.FORGE A malicious user may falsify the identity of an external entity in order to

illicitly request to receive security attribute data or to provide invalid data

to the TOE.

T. INSUFFATR

An Assignment Manager may be incapable of using the TOE to define

identities, credentials, and attributes in sufficient detail to facilitate

authorization and access control, causing other ESM products to behave

in a manner that allows illegitimate activity or prohibits legitimate

activity.

T.MASK A malicious user may attempt to mask their actions, causing audit data to

be incorrectly recorded or never recorded.

T.RAWCRED A malicious user may attempt to access stored credential data directly, in

order to obtain credentials that may be replayed to impersonate another

user.

T.UNAUTH A malicious user could bypass the TOE’s identification, authentication,

or authorization mechanisms in order to illicitly use the TOE’s

management functions.

T.WEAKIA A malicious user could be illicitly authenticated by the TSF through

brute-force guessing of authentication credentials.

Table 4-1: TOE Threats

4.2 Organizational Security Policies

This section identifies the organizational security policies which are expected to be implemented by an

organization that deploys the TOE. These policies have been taken from the ICM PP.

Policy Policy Definition

P.BANNER

The TOE shall display an initial banner describing restrictions of use, legal

agreements, or any other appropriate information to which users consent by

accessing the system.

Table 4-2: TOE Organization Security Policies

4.3 Assumptions

The specific conditions listed in this section are assumed to exist in the TOE’s Operational Environment.

These assumptions have been taken from the ICM PP.

Page 19: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

18 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Assumption Assumption Definition

A.CRYPTO The TOE will use cryptographic primitives provided by the Operational

Environment to perform cryptographic services.

A.ENROLLMENT There will be a defined enrollment process that confirms user identity

before the assignment of credentials.

A.ESM The TOE will be able to establish connectivity to other ESM products in

order to share security data.

A.FEDERATE Third-party entities that exchange attribute data with the TOE are assumed

to be trusted.

A.MANAGE There will be one or more competent individuals assigned to install,

configure, and operate the TOE.

A.SYSTIME The TOE will receive reliable time data from the Operational Environment.

Table 4-3: TOE Assumptions

Note that the TSF satisfies A.ESM by establishing a secure connection to one or more environmental

identity stores that other ESM products may use for administrator identification, authentication, and/or

administration. The TOE is not expected to connect directly to other ESM products to share this data; it

will be shared with other ESM products through updating a data store that is in the Operational

Environment of other ESM products.

4.4 Security Objectives

This section identifies the security objectives of the TOE and its supporting environment. The security

objectives identify the responsibilities of the TOE and its environment in meeting the security needs.

4.4.1 TOE Security Objectives

This section identifies the security objectives of the TOE. These objectives have been taken from the ICM

PP. A subset of the optional security objectives has been included based on the set of optional SFRs that

are claimed by the TSF.

Objective Objective Definition

O.ACCESSID The TOE will include the ability to validate the identity of other ESM products

prior to distributing data to them.

O.AUDIT The TOE will provide measures for generating and recording security relevant

events that will detect access attempts to TOE-protected resources by users.

O.AUTH

The TOE will provide a mechanism to validate requested authentication

attempts and to determine the extent to which any validated subject is able to

interact with the TSF.

O.BANNER The TOE will display an advisory warning regarding use of the TOE.

O.EXPORT The TOE will provide the ability to transmit user attribute data to trusted IT

products using secure channels.

O.IDENT The TOE will provide the Assignment Managers with the ability to define

detailed identity and credential attributes.

O.INTEGRITY The TOE will provide the ability to assert the integrity of identity, credential,

or authorization data.

Page 20: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

19 | P a g e

Booz Allen Hamilton – CATL / SailPoint

O.MANAGE The TOE will provide Assignment Managers with the capability to manage the

TSF.

O.PROTCOMMS The TOE will provide protected communication channels for administrators,

other parts of a distributed TOE, and authorized IT entities.

O.PROTCRED The TOE will be able to protect stored credentials.

O.ROBUST The TOE will provide mechanisms to reduce the ability for an attacker to

impersonate a legitimate user during authentication.

O.SELFID

The TOE will be able to confirm its identity to the ESM deployment upon

sending identity, credential, or authorization data to dependent machines within

the ESM deployment.

Table 4-4: TOE Objectives

4.4.2 Security Objectives for the Operational Environment

This section identifies the security objectives of the environment into which the TOE is expected to be

deployed. These objectives have been taken from the ICM PP. A subset of the optional environmental

objectives has been included based on the set of optional SFRs that are not claimed by the TSF.

Objective Objective Definition

OE.ADMIN There will be one or more administrators of the Operational Environment that

will be responsible for providing subject identity to attribute mappings within

the TOE.

OE.CRYPTO The Operational Environment will provide cryptographic primitives that can be

used by the TOE to provide services such as ensuring the confidentiality and

integrity of communications.

OE.ENROLLMENT The Operational Environment will provide a defined enrollment process that

confirms user identity before the assignment of credentials.

OE.FEDERATE Data the TOE exchanges with trusted external entities is trusted.

OE.INSTALL Those responsible for the TOE shall ensure that the TOE is delivered, installed,

managed, and operated in a manner that is consistent with IT security.

OE.MANAGEMENT The Operational Environment will provide an Authentication Server

component that uses identity and credential data maintained by the TOE.

OE.PERSON Personnel working as TOE administrators shall be carefully selected and

trained for proper operation of the TOE.

OE.SYSTIME The Operational Environment will provide reliable time data to the TOE.

Table 4-5: TOE Operational Environment Objectives

4.5 Security Problem Definition Rationale

The assumptions, threats, OSPs, and objectives that are defined in this ST represent the assumptions,

threats, OSPs, and objectives that are specified in the Protection Profile to which the TOE claims

conformance. The associated mappings of assumptions to environmental objectives, SFRs to TOE

objectives, and OSPs and objectives to threats are therefore identical to the mappings that are specified in

the claimed Protection Profile.

Page 21: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

20 | P a g e

Booz Allen Hamilton – CATL / SailPoint

5 Extended Components Definition

5.1 Extended Security Functional Requirements

The extended Security Functional Requirements that are claimed in this ST are taken directly from the PP

to which the ST and TOE claim conformance. These extended components are formally defined in the PP

that requires their usage.

5.2 Extended Security Assurance Requirements

There are no extended Security Assurance Requirements in this ST.

Page 22: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

21 | P a g e

Booz Allen Hamilton – CATL / SailPoint

6 Security Functional Requirements

6.1 Conventions

The CC permits four functional component operations—assignment, refinement, selection, and

iteration—to be performed on functional requirements. This ST will highlight the operations in the

following manner:

Assignment: allows the specification of an identified parameter. Indicated with bold text.

Refinement: allows the addition of details. Indicated with italicized text.

Selection: allows the specification of one or more elements from a list. Indicated with underlined

text.

Iteration: allows a component to be used more than once with varying operations. Indicated with

a sequential number in parentheses following the element number of the iterated SFR.

When multiple operations are combined, such as an assignment that is provided as an option within a

selection or refinement, a combination of the text formatting is used.

If SFR text is reproduced verbatim from text that was formatted in a claimed PP (such as if the PP’s

instantiation of the SFR has a refinement or a completed assignment), the formatting is not preserved.

This is so that the reader can identify the operations that are performed by the ST author as opposed to the

PP author.

Finally, when multiple cases are specified for the handling of TSF behavior based on the contents of a

selection, only the applicable case(s) has been retained. This unambiguously defines the TSF by

excluding non-applicable conditional statements. Application notes have been included in all instances of

this so that all omissions are clearly identified. If an entire SFR component is non-applicable (e.g.

FAU_GEN_EXT.1.3 only applies to TOE-internal audit data storage, which the TSF does not provide),

the component has been retained.

6.2 Security Functional Requirements Summary

The following table lists the SFRs claimed by the TOE:

Class Name Component Identification Component Name

Enterprise Security

Management

ESM_EAU.2 Reliance on Enterprise Authentication

ESM_EID.2 Reliance on Enterprise Identification

ESM_ICD.1 Identity and Credential Definition

ESM_ICT.1 Identity and Credential Transmission

Security Audit FAU_GEN.1 Audit Data Generation

FAU_STG_EXT.1 External Audit Trail Storage

Identification and

Authentication

FIA_AFL.1 Authentication Failure Handling

FIA_USB.1 User-Subject Binding

FIA_SOS.1 Verification of Secrets

Security Management

FMT_MOF.1 Management of Functions Behavior

FMT_MTD.1 Management of TSF Data

FMT_SMF.1 Specification of Management Functions

FMT_SMR.1 Specification of Security Roles

Page 23: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

22 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Class Name Component Identification Component Name

Protection of the TSF FPT_APW_EXT.1 Protection of Administrator Passwords

FPT_SKP_EXT.1 Protection of Secret Key Parameters

TOE Access

FTA_TAB.1 TOE Access Banner

FTA_SSL.3 TSF-initiated Termination

FTA_SSL.4 User-initiated Termination

Trusted Path /Channels FTP_ITC.1 Inter-TSF Trusted Channel

FTP_TRP.1 Trusted Path

Table 6-1: Security Functional Requirements for the TOE

Page 24: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

23 | P a g e

Booz Allen Hamilton – CATL / SailPoint

6.3 Security Functional Requirements

6.3.1 Class ESM: Enterprise Security Management

6.3.1.1 ESM_EAU.2 Reliance on Enterprise Authentication

ESM_EAU.2.1 The TSF shall rely on [[IdentityIQ internal mechanism], [Active

Directory]] for subject authentication.

ESM_EAU.2.2 The TSF shall require each subject to be successfully authenticated

before allowing any other TSF-mediated actions on behalf of that

subject.

Application Note: IdentityIQ allows an unauthenticated user to register for an account via

self-services. This functionality is disabled by default. The self-service

registration will remain disabled within the evaluated configuration.

6.3.1.2 ESM_EID.2 Reliance on Enterprise Identification

ESM_EID.2.1 The TSF shall rely on [[IdentityIQ internal mechanism], [Active

Directory]] for subject identification.

ESM_EID.2.2 The TSF shall require each subject to be successfully identified before

allowing any other TSF-mediated actions on behalf of that subject.

6.3.1.3 ESM_ICD.1 Identity and Credential Definition

ESM_ICD.1.1 The TSF shall provide the ability to define identity and credential data

for use with other Enterprise Security Management products.

ESM_ICD.1.2 The TSF shall define the following security-relevant identity and

credential attributes for enterprise users: credential lifetime, credential

status, [account attributes and group attributes].

Application Note: Account attributes contain items such as display name, phone numbers,

and titles. Group attributes contain information such as group type and

group scope. For a full list of these attributes refer to the Account

attributes and Group attributes tables located under Chapter 1: SailPoint

IdentityIQ Active Directory Connector in the Schema attributes section in

[14].

Application Note: When configured by an administrator to do so, the TOE can utilize any

attributes collected by endpoint applications to manage an enterprise

user's identity throughout the Operational Environment.

ESM_ICD.1.3 The TSF shall provide the ability to enroll enterprise users through

assignment of unique identifying data.

ESM_ICD.1.4 The TSF shall provide the ability to associate defined security-relevant

attributes with enrolled enterprise users.

ESM_ICD.1.5 The TSF shall provide the ability to query the status of an enterprise user’s

credentials.

Page 25: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

24 | P a g e

Booz Allen Hamilton – CATL / SailPoint

ESM_ICD.1.6 The TSF shall provide the ability to revoke an enterprise user’s credentials.

ESM_ICD.1.7 The TSF shall provide the ability for a compatible Authentication Server

ESM product to update an enterprise user’s credentials.

ESM_ICD.1.8 The TSF shall ensure that the defined enterprise user credentials satisfy

the following strength rules:

a) For password-based credentials, the following rules apply:

1. Passwords shall be able to be composed of a subset of the

following character sets: [upper case letters, lower case

letters, numbers, and special characters] that include the

following values [A B C D E F G H I J K L M N O P Q R S

T U V W X Y Z a b c d e f g h i j k l m n o p q r s t u v w x

y z 1 2 3 4 5 6 7 8 9 0 ! @ # $ % ^ & * ( )]; and

2. Minimum password length shall settable by an administrator,

and support passwords of 15 characters or greater; and

3. Password composition rules specifying the types and numbers

of required characters that comprise the password shall be

settable by an administrator; and

4. Passwords shall not be reused within the last administrator-

settable number of passwords used by that user;

b) For non-password-based credentials, the following rules apply:

1. The probability that a secret can be obtained by an attacker

during the lifetime of the secret is less than 2-20.

Application Note: The case of non-password-based credentials (b) is not applicable to the

TOE.

6.3.1.4 ESM_ICT.1 Identity and Credential Transmission

ESM_ICT.1.1 The TSF shall transmit [identity and credential data] to compatible and

authorized Enterprise Security Management products under the

following circumstances: [immediately following creation or

modification of data].

6.3.2 Class FAU: Security Audit

6.3.2.1 FAU_GEN.1 Audit Data Generation

FAU_GEN.1.1 The TSF shall be able to generate an audit record of the following

auditable events:

a) Start-up and shutdown of the audit functions; and

b) All auditable events identified in Table 6-2 for the not specified level

of audit; and

c) [no other auditable events].

Page 26: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

25 | P a g e

Booz Allen Hamilton – CATL / SailPoint

Component Event Additional Information

ESM_EAU.2 All use of the authentication

mechanism None

ESM_ICD.1 Creation or modification of identity and

credential data The attribute(s) modified

ESM_ICD.1 Enrollment or modification of subject The subject created or modified, the

attribute(s) modified (if applicable)

ESM_ICT.1 All attempts to transmit information The destination to which the transmission

was attempted

FAU_STG_EXT.1 Establishment and disestablishment of

communications with audit server Identification of audit server

FIA_AFL.1

The reaching of an unsuccessful

authentication attempt threshold, the

actions taken when the threshold is

reached, and any actions taken to

restore the normal state

Action taken when threshold is reached

FIA_SOS.1 Rejection or acceptance by the TSF of

any tested secret None

FIA_SOS.1 Identification of any changes to the

defined quality metrics The change made to the quality metric

FMT_MOF.1 All modifications of TSF function

behavior None

FMT_SMF.1 Use of the management functions Management function performed

FTA_SSL.3 All session termination events None

FTA_SSL.4 All session termination events None

FTP_ITC.1 All use of trusted channel functions Identity of the initiator and target of the

trusted channel

FTP_TRP.1 All attempted uses of the trusted path

functions

Identification of user associated with all

trusted path functions, if available

Table 6-2: Auditable Events

FAU_GEN.1.2 The TSF shall record within each audit record at least the following

information:

a) Date and time of the event, type of event, subject identity (if

applicable), and the outcome (success or failure) of the event; and

b) For each audit event type, based on the auditable event definitions of

the functional components included in the PP/ST, [no other audit

relevant information].

6.3.2.2 FAU_STG_EXT.1 External Audit Trail Storage

FAU_STG_EXT.1.1 The TSF shall be able to transmit the generated audit data to [the Oracle

database].

FAU_STG_EXT.1.2 The TSF shall ensure that transmission of generated audit data to any

external IT entity uses a trusted channel defined in FTP_ITC.1.

FAU_STG_EXT.1.3 The TSF shall ensure that any TOE-internal storage of generated audit

Page 27: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

26 | P a g e

Booz Allen Hamilton – CATL / SailPoint

data:

a) protects the stored audit records in the TOE-internal audit trail

from unauthorized deletion; and

b) prevents unauthorized modifications to the stored audit records

in the TOE-internal audit trail.

Application Note: There is no TOE-internal storage of audit data. All audit data is stored in

the Oracle database within the Operational Environment.

6.3.3 Class FIA: Identification and Authentication

6.3.3.1 FIA_AFL.1 Authentication Failure Handling

FIA_AFL.1.1 The TSF shall detect when [an administrator configurable positive integer

within [1-99]] unsuccessful authentication attempts occur related to

[authentication to the GUI].

FIA_AFL.1.2 When the defined number of unsuccessful authentication attempts has

been [met], the TSF shall [lock the account until an administrator

configurable positive integer within 1-1440 minutes has been reached,

or until an administrator manually unlocks the account].

6.3.3.2 FIA_SOS.1 Verification of Secrets

FIA_SOS.1.1 The TSF shall provide a mechanism to verify that secrets meet the

following:

a) For environmental password-based authentication, the following

rules apply:

1. Passwords shall be able to be composed of a subset of the

following character sets: [upper case letters, lower case letters,

numbers, and special characters] that include the following values

[A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a b c d

e f g h i j k l m n o p q r s t u v w x y z 1 2 3 4 5 6 7 8 9 0 ! @ # $ %

^ & * ( )]; and

2. Minimum password length shall settable by an administrator,

and support passwords of 16 characters or greater; and

3. Password composition rules specifying the types and

numbers of required characters that comprise the password shall be

settable by an administrator; and

4. Passwords shall have a maximum lifetime, configurable by

an administrator; and

5. New passwords shall contain a minimum of an

administrator-specified number of character changes from the

previous password; and

6. Passwords shall not be reused within the last administrator-

settable number of passwords used by that user;

Page 28: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

27 | P a g e

Booz Allen Hamilton – CATL / SailPoint

b) For non-password-based authentication, the following rules

apply:

1. The probability that a secret can be obtained by an attacker

during the lifetime of the secret is less than 2-20.

Application Note: The case of non-password-based credentials (b) is not applicable to the

TOE.

6.3.3.3 FIA_USB.1 User-Subject Binding

FIA_USB.1.1 The TSF shall associate the following user security attributes with subjects

acting on the behalf of that user: [username, principal, capabilities,

rights, dynamic scopes].

Application Note: The "username" is the credential identified by the authentication source

(IdentityIQ or Active Directory in the evaluated configuration). The

"principal" is the credential utilized by IdentityIQ to authorize user

activity. The "username" and "principal" will be the same if the user is

authenticated by IdentityIQ but may differ depending on deployment of a

third party authentication source.

FIA_USB.1.2 The TSF shall enforce the following rules on the initial association of user

security attributes with subjects acting on the behalf of users: [association

of a user’s session and security attributes assigned to the user].

FIA_USB.1.3 The TSF shall enforce the following rules governing changes to the user

security attributes associated with subjects acting on the behalf of users:

[the user's session will persist until logout and security attribute

changes will be reflected upon the user’s next authentication]

6.3.4 Class FMT: Security Management

6.3.4.1 FMT_MOF.1 Management of Functions Behavior

FMT_MOF.1 The TSF shall restrict the ability to [determine the behavior of, modify the

behavior of] the functions: [specified in Table 6-3] to [the authorized

roles for each function specified in Table 6-3].

Requirement Management Functions Capabilities (Roles)

ESM_EAU.2 Management of authentication data for both

interactive users and authorized IT entities (if

managed by the TSF)

System Admin, Identity Admin,

Password Admin

ESM_EID.2 Management of authentication data for both

interactive users and authorized IT entities (if

managed by the TSF)

System Admin, Identity Admin,

Password Admin

ESM_ICD.1 Definition of identity and credential data that can be

associated with users (activate, suspend, revoke

credential, etc.)

System Admin, Password Admin,

Identity Admin

Page 29: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

28 | P a g e

Booz Allen Hamilton – CATL / SailPoint

ESM_ICD.1 Management of credential status System Admin, Identity Admin

ESM_ICD.1 Enrollment of users into repository System Admin

ESM_ICT.1 Configuration of circumstances in which

transmission of identity and credential data (and

object attributes, if applicable) is performed

System Admin, Application Admin

FAU_STG_EXT.1 Configuration of external audit storage location System Admin

FIA_AFL.1

(optional)

Management of the threshold for unsuccessful

authentication attempts

Management of actions to be taken in the event of an

authentication failure

System Admin, Help Desk

Personnel

FIA_SOS.1

(optional)

Management of the metric used to verify secrets System Admin, Certification

Admin

FIA_USB.1 Definition of default subject security attributes,

modification of subject security attributes

System Admin, Identity Admin

FMT_MOF.1 Management of sets of users that can interact with

security functions

System Admin

FMT_SMR.1 Management of the users that belong to a particular

role

System Admin, Role Admin, IT

Role Admin, Business Role

Admin, Entitlement Role Admin

FTA_SSL.3

(optional)

Configuration of the inactivity period for session

termination

System Admin

FTA_TAB.1 Maintenance of the banner System Admin

FTP_ITC.1 Configuration of actions that require trusted channel

(if applicable)

System Admin

FTP_TRP.1 Configuration of actions that require trusted path (if

applicable)

System Admin

Table 6-3: Management Functions by Role

6.3.4.2 FMT_MTD.1 Management of TSF Data

FMT_MTD.1.1 The TSF shall restrict the ability to [query, modify, delete] the [Objects

defined in Table 6-4] to [the role define in Table 6-4].

Function Object Role

Query Username User, SysAdmin, Manager

Modify Password, Security Questions and Answers User, SysAdmin, Manager

Modify Username SysAdmin, Manager

Delete Username, Password, Security Questions and

Answers SysAdmin, Manager

Table 6-4: Management of TSF Data

Application Note: “User” in this table represents the User that is currently logged into the

TOE. Users have the ability to self-manage their own passwords and

Security Questions/Answers.

Application Note: “Manager” in this context refers to a user that has the “Manager” flag

set on their account. Any “Manager” may perform these management

functions against users that are within their hierarchy.

Page 30: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

29 | P a g e

Booz Allen Hamilton – CATL / SailPoint

6.3.4.3 FMT_SMF.1 Specification of Management Functions

FMT_SMF.1 The TSF shall be capable of performing the following management

functions: [management functions listed in Table 6-3].

6.3.4.4 FMT_SMR.1 Security Management Roles

FMT_SMR.1.1 The TSF shall maintain the roles [Application Admin, Auditor, Batch

Request Admin, Business Role Admin, Certification Admin,

Compliance Officer, Rule Admin, Managed Attribute Provisioning

Admin, Managed Attribute Property Admin, Entitlement Role

Admin, Identity Request Admin, Identity Admin, IT Role Admin,

Organizational Role Admin, Password Admin, Policy Admin, Role

Admin, Signoff Admin, Identity Correlation Admin, System Admin

(SYSADMIN), Task Results Viewer, Webservices Executer,

Workgroup Admin, Help Desk Personnel, Work Item Admin, Access

Manager, Syslog Admin].

Application Note: The term “Roles” refer to the capabilities that come “out-of-the-box”.

Application Note: Roles in the context of IdentityIQ are the combination of “capabilities”

and “rights”.

FMT_SMR.1.2 The TSF shall be able to associate users with roles.

6.3.5 Class FPT: Protection of the TSF

6.3.5.1 FPT_APW_EXT.1 Protection of Administrator Passwords

FPT_APW_EXT.1.1 The TSF shall store credentials in non-plaintext form.

FPT_APW_EXT.1.2 The TSF shall prevent the reading of plaintext credentials.

6.3.5.2 FPT_SKP_EXT.1 Protection of TSF Data (for reading of all symmetric keys)

FPT_SKP_EXT.1.1 The TSF shall prevent reading of all pre-shared keys, symmetric keys,

and private keys.

6.3.6 Class FTA: TOE Access

6.3.6.1 FTA_SSL.3 TSF-initiated Termination

FTA_SSL.3.1 Refinement: The TSF shall terminate a remote interactive session after

an Authorized Administrator-configurable time interval of session

inactivity.

6.3.6.2 FTA_SSL.4 User-initiated Termination

FTA_SSL.4.1 Refinement: The TSF shall allow Administrator-initiated termination of

the Administrator’s own interactive session.

Page 31: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

30 | P a g e

Booz Allen Hamilton – CATL / SailPoint

6.3.6.3 FTA_TAB.1 TOE Access Banner

FTA_TAB.1.1 Refinement: Before establishing a user session, the TSF shall display a

configurable advisory warning message regarding unauthorized use of

the TOE.

6.3.7 Class FTP: Trusted Path/Channels

6.3.7.1 FTP_ITC.1 Inter-TSF Trusted Channel

FTP_ITC.1.1 Refinement: The TSF shall use [[TLS from the Operational

Environment’s JNDI, ADSI, and JDBC components]] to provide a

trusted communication channel between itself and authorized IT entities

that is logically distinct from other communication channels and

provides assured identification of its end points and protection of the

channel data from modification and disclosure.

Application Note: JNDI, ADSI, and JDBC connectors are provided by the Operational

Environment.

FTP_ITC.1.2 The TSF shall permit [the TSF] to initiate communication via the trusted

channel.

FTP_ITC.1.3 Refinement: The TSF shall initiate communication via the trusted

channel for transfer of policy data, [enterprise user data, IdentityIQ

administrator data].

6.3.7.2 FTP_TRP.1 Trusted Path

FTP_TRP.1.1 Refinement: The TSF shall use [[HTTPS from the Operational

Environment’s Tomcat with OpenSSL]] to provide a communication

path between itself and remote users that is logically distinct from other

communication channels and provides assured identification of its end

points and protection of the communicated data from modification,

disclosure.

FTP_TRP.1.2 The TSF shall permit remote users to initiate communication via the

trusted path.

FTP_TRP.1.3 Refinement: The TSF shall require the use of the trusted path for initial

user authentication, execution of management functions.

6.4 Statement of Security Functional Requirements Consistency

The Security Functional Requirements included in the ST represent all required SFRs specified in the PP

against which exact compliance is claimed and a subset of the optional SFRs. All hierarchical

relationships, dependencies, and unfulfilled dependency rationales in the ST are considered to be identical

to those that are defined in the claimed PP, with the exception of a corrected wording in FTP_ITC.1.3 to

reflect the intent of the SFR.

Page 32: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

31 | P a g e

Booz Allen Hamilton – CATL / SailPoint

7 Security Assurance Requirements

This section identifies the Security Assurance Requirements (SARs) that are claimed for the TOE. The

SARs which are claimed are consistent with the SARs that are defined in the claimed Protection Profile.

7.1 Class ADV: Development

7.1.1 Basic Functional Specification (ADV_FSP.1)

7.1.1.1 Developer action elements:

ADV_FSP.1.1D

The developer shall provide a functional specification.

ADV_FSP.1.2D

The developer shall provide a tracing from the functional specification to the SFRs.

7.1.1.2 Content and presentation elements:

ADV_FSP.1.1C

The functional specification shall describe the purpose and method of use for each SFR-enforcing and

SFR-supporting TSFI.

ADV_FSP.1.2C

The functional specification shall identify all parameters associated with each SFR-enforcing and

SFR-supporting TSFI.

ADV_FSP.1.3C

The functional specification shall provide rationale for the implicit categorization of interfaces as

SFR-non-interfering.

ADV_FSP.1.4C

The tracing shall demonstrate that the SFRs trace to TSFIs in the functional specification.

7.1.1.3 Evaluator action elements:

ADV_ FSP.1.1E

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

ADV_ FSP.1.2E

The evaluator shall determine that the functional specification is an accurate and complete

instantiation of the SFRs.

Page 33: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

32 | P a g e

Booz Allen Hamilton – CATL / SailPoint

7.2 Class AGD: Guidance Documentation

7.2.1 Operational User Guidance (AGD_OPE.1)

7.2.1.1 Developer action elements:

AGD_OPE.1.1D

The developer shall provide operational user guidance.

7.2.1.2 Content and presentation elements:

AGD_OPE.1.1C

The operational user guidance shall describe, for each user role, the user-accessible functions and

privileges that should be controlled in a secure processing environment, including appropriate

warnings.

AGD_OPE.1.2C

The operational user guidance shall describe, for each user role, how to use the available interfaces

provided by the TOE in a secure manner.

AGD_OPE.1.3C

The operational user guidance shall describe, for each user role, the available functions and interfaces,

in particular all security parameters under the control of the user, indicating secure values as

appropriate.

AGD_OPE.1.4C

The operational user guidance shall, for each user role, clearly present each type of security-relevant

event relative to the user-accessible functions that need to be performed, including changing the

security characteristics of entities under the control of the TSF.

AGD_OPE.1.5C

The operational user guidance shall identify all possible modes of operation of the TOE (including

operation following failure or operational error), their consequences and implications for maintaining

secure operation.

AGD_OPE.1.6C

The operational user guidance shall, for each user role, describe the security measures to be followed

in order to fulfill the security objectives for the operational environment as described in the ST.

AGD_OPE.1.7C

The operational user guidance shall be clear and reasonable.

7.2.1.3 Evaluator action elements:

AGD_OPE.1.1E

Page 34: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

33 | P a g e

Booz Allen Hamilton – CATL / SailPoint

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

7.2.2 Preparative Procedures (AGD_PRE.1)

7.2.2.1 Developer action elements:

AGD_PRE.1.1D

The developer shall provide the TOE including its preparative procedures.

7.2.2.2 Content and presentation elements:

AGD_ PRE.1.1C

The preparative procedures shall describe all the steps necessary for secure acceptance of the

delivered TOE in accordance with the developer's delivery procedures.

AGD_ PRE.1.2C

The preparative procedures shall describe all the steps necessary for secure installation of the TOE

and for the secure preparation of the operational environment in accordance with the security

objectives for the operational environment as described in the ST.

7.2.2.3 Evaluator action elements:

AGD_ PRE.1.1E

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

AGD_ PRE.1.2E

The evaluator shall apply the preparative procedures to confirm that the TOE can be prepared

securely for operation.

7.3 Class ALC: Life Cycle Support

7.3.1 Labeling of the TOE (ALC_CMC.1)

7.3.1.1 Developer action elements:

ALC_CMC.1.1D

The developer shall provide the TOE and a reference for the TOE.

7.3.1.2 Content and presentation elements:

ALC_CMC.1.1C

The TOE shall be labeled with its unique reference.

Page 35: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

34 | P a g e

Booz Allen Hamilton – CATL / SailPoint

7.3.1.3 Evaluator action elements:

ALC_CMC.1.1E

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

7.3.2 TOE CM Coverage (ALC_CMS.1)

7.3.2.1 Developer action elements:

ALC_CMS.1.1D

The developer shall provide a configuration list for the TOE.

7.3.2.2 Content and presentation elements:

ALC_CMS.1.1C

The configuration list shall include the following: the TOE itself; and the evaluation evidence

required by the SARs.

ALC_CMS.1.2C

The configuration list shall uniquely identify the configuration items.

7.3.2.3 Evaluator action elements:

ALC_CMS.1.1E

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

7.4 Class ATE: Tests

7.4.1 Independent Testing - Conformance (ATE_IND.1)

7.4.1.1 Developer action elements:

ATE_IND.1.1D

The developer shall provide the TOE for testing.

7.4.1.2 Content and presentation elements:

ATE_IND.1.1C

The TOE shall be suitable for testing.

7.4.1.3 Evaluator action elements:

ATE_IND.1.1E

Page 36: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

35 | P a g e

Booz Allen Hamilton – CATL / SailPoint

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

ATE_IND.1.2E

The evaluator shall test a subset of the TSF to confirm that the TSF operates as specified.

7.5 Class AVA: Vulnerability Assessment

7.5.1 Vulnerability Survey (AVA_VAN.1)

7.5.1.1 Developer action elements:

AVA_VAN.1.1D

The developer shall provide the TOE for testing.

7.5.1.2 Content and presentation elements:

AVA_VAN.1.1C

The TOE shall be suitable for testing.

7.5.1.3 Evaluator action elements:

AVA_VAN.1.1E

The evaluator shall confirm that the information provided meets all requirements for content and

presentation of evidence.

AVA_VAN.1.2E

The evaluator shall perform a search of public domain sources to identify potential vulnerabilities in

the TOE.

AVA_VAN.1.3E

The evaluator shall conduct penetration testing, based on the identified potential vulnerabilities, to

determine that the TOE is resistant to attacks performed by an attacker possessing Basic attack

potential.

Page 37: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

36 | P a g e

Booz Allen Hamilton – CATL / SailPoint

8 TOE Summary Specification

The following sections identify the security functions of the TOE and describe how the TSF meets each

claimed SFR.

8.1 Enterprise Security Management

8.1.1 ESM_EAU.2

Before allowing any other TSF-mediated action, enterprise user authentication must be performed against

either the IdentityIQ's authentication mechanism or one or more environmental Active Directory servers'

authentication mechanism. Both authentication mechanisms rely on username and password-based

credentials for subject authentication. In the evaluated configuration, the TOE uses an Oracle 11g

database that resides in the Operational Environment for its user store. When authenticating a user against

the TOE’s user store, the TOE will request the JRE to encrypt the user's password using AES-128 with

Base64 encoding and will compare the user’s username and encrypted password against the values stored

in the Oracle database. The Active Directory authentication is performed via an LDAP bind request which

is secured using TLS over an environmental connection via JRE's JNDI.

Every authentication source (AD server 1, AD server 2, etc., and IdentityIQ) is checked for the user's

identity during authentication. All sources will be checked until the user is successfully authenticated or it

is determined that the user does not exist or has failed authentication. The authentication sources are

checked based upon an administratively defined order, with the IdentityIQ authentication mechanism

being checked last. When a match of the user's identity credential is found, the authentication source will

attempt to authenticate the user.

When a user has forgotten their password, the user can answer a series of security questions. If the user

answers the questions correctly, the TSF will authenticate the user and the user may then reset their

password. The answers to user security questions are also stored in an the Oracle database in the AES-128

with Base64 encoding encrypted format and the TOE would similarly request the JRE to encrypt the user

provided answers when comparing them to the values stored in the database.

In the event that there are multiple authentication sources with the same username, IdentityIQ will

identify these occurrences and allow the administrators to perform administrative actions to correct these

conflicts.

8.1.2 ESM_EID.2

See ESM_EAU.2 above.

8.1.3 ESM_ICD.1

The TOE has the ability to communicate with Active Directory to define identity and credential data for

enterprise users. This communication is accomplished through the use of connectors. In the evaluated

configuration, IdentityIQ will communicate with one or more instances of Active Directory utilizing the

ADSI connector. The TOE will also communicate with the Oracle 11g database using JDBC. The TSF

allows the management (query, change, or delete) of an enterprise user’s credentials (non-IdentityIQ

specific credentials) through Active Directory.

Page 38: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

37 | P a g e

Booz Allen Hamilton – CATL / SailPoint

IdentityIQ connects to Active Directory servers to perform compliance checks (also known as

"certifications") by reading the enforced policies and enterprise user data that is stored within Active

Directory and then writes that information into its Oracle Database. The data that is collected is considered

either account attributes or group attributes. Account attributes contain items such as display name, phone

numbers and titles. Also included within the account attributes are the user's credential lifetime (i.e.

password expiration) and credential status (i.e. user account is enabled, disabled, locked). While Group

Attributes contain information such as group type, group scope etc. The TOE has the ability to read in any

attribute located on Active Directory and the list of attributes collected is based upon administrative

configuration.

The TOE enrolls users in one of two ways. The TSF will perform compliance checks by reading the existing

enterprise user data that is stored within the Active Directory servers and then writing that information into

its Oracle database, thus enrolling the user. A user can also be created and enrolled through IdentityIQ's

GUI interface by an administrator. All enterprise users are assigned the unique attribute called a 'principal'

which identifies the user within IdentityIQ.

The security relevant attributes assigned to an enterprise user depend on the policies in which the

administrator has defined within the TOE. The TOE is able to read any attribute configured in Active

Directory. Likewise, administrators with the proper capabilities have the ability to create new attributes for

enterprise users and provision them to one or more Active Directory instances.

An administrator has the ability to query the status of an enterprise user through IdentityIQ's GUI. This can

be done by verifying the latest information (per last certification) stored in the Oracle Database or by

requesting the Active Directory instances to provide the status. An administrator also has the ability to

disable an enterprise user through IdentityIQ’s GUI. IdentityIQ will immediately provision the Active

Directory instances to revoke the user as well.

IdentityIQ uses the Lifecycle Manager to manage environmental user’s passwords that are stored in the

Active Directory servers that it manages. This is accomplished over the Active Directory ADSI connector

(via interface E4) when the PASSWORD feature is enabled. A separate password policy can be defined for

each instance of Active Directory. The “identity filter” can also be used to define multiple policies within

a single instance of Active Directory by applying the policy only to the identities within the filter. IdentityIQ

enforces these password policies only if the user changes their password via IdentityIQ directly. The TOE

will not enforce the password policy if the password is changed in the environment.

Password-based credentials can be configured to include upper case and lower case letters, numbers and

special characters. In the evaluated configuration, the minimum password length supported is 16 characters

and can be configured to be greater than 16 characters. If a user has an existing password that does not meet

the password policy, the TOE will enforce the password policy at the time of the next password change.

The TSF is capable of enforcing composition rules for the configuration of strong passwords. For example,

“Minimum number of lowercase letters” or “Minimum number of special characters” can be configured by

an administrator. Administrators can also configure the password history length. The password history

length is the number of past passwords that cannot be reused.

8.1.4 ESM_ICT.1

IdentityIQ provisions the enterprise user identity and credential data to one or more instances of Active

Directory based upon the configuration of the administrator. Provisioning occurs immediately following

Page 39: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

38 | P a g e

Booz Allen Hamilton – CATL / SailPoint

the creation or modification of the data by an administrator through IdentityIQ. Provisioning occurs

through the use of a provisioning form that allows an administrator to define the AD user’s credentials

and account attributes. Once the administrator completes the form, provisioning of the data automatically

occurs. If an Active Directory instance is not responsive or unavailable when a change is supposed to

occur, the Administrator will see an error when attempting to provision data. Once the AD becomes

available, the Administrator will have to repeat the process to update or create the user data to the identity

store.

8.2 Security Audit

8.2.1 FAU_GEN.1:

The TSF generates audit records when auditable events occur. The auditable events that are logged are

described in Table 6-2. These audit records are written to the Oracle 11g database that resides in the

Operational Environment. Auditing needs to be configured for each of the types of events listed in the

table. The actions that trigger the events can be performed by a user with the SYSADMIN capability,

thus, a SYSADMIN user has the ability to start and stop the audit functions for particular events.

For each auditable event, the date, time, type, subject identity, and outcome of the event is logged.

8.2.2 FAU_STG_EXT.1:

The TOE generates audit data for events and writes them to the Oracle 11g database. IdentityIQ does not

store any audit data locally. No user has the ability to delete or modify the audit data that resides in the

Operational Environment via the TOE. The TOE does not provide any interface or mechanism to

complete such actions. The transmission of data is protected using TLS via the JRE’s JDBC that is

provided by the Operational Environment.

8.3 Identification and Authentication

8.3.1 FIA_AFL.1:

The TOE provides the ability to discourage brute force authentication attempts by providing

authentication failure handling for the GUI. Administrators can configure the number of unsuccessful

attempts to any selection within 1-99. The default setting is five.

Once the administrator defined value has been met the user will be locked out until an administrator

manually unlocks the account or until an administrator configurable positive integer within 1 -1440

minutes has been reached.

IdentityIQ also has the ability to identify and grant users the 'protected users' privilege and these users

cannot be locked out. In the out-of-the-box configuration, the SYSADMIN capability is granted this

privilege. In the evaluated configuration, the SYSADMIN capability will have this privilege removed and

no other user/capability will be granted it. This is done by configuring the field 'Enable Protected User

Lockout'.

8.3.2 FIA_SOS.1:

Password-based credentials can be configured to include upper and lower case letters, numbers and special

Page 40: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

39 | P a g e

Booz Allen Hamilton – CATL / SailPoint

characters. To prevent users from using similar password consecutively, password changes are also required

to have a minimum number of character changes from the previous password. This is configurable within

the password policy by configuring the “Minimum number of characters by position” and the “Case

sensitive check” settings. In the evaluated configuration, the minimum password length supported is 16

characters and can be configured to be a maximum of 300 characters. IdentityIQ administrators with the

proper capabilities are also capable of enforcing users to configure passwords to meet composition rules.

For example, “Minimum number of lowercase letters” or “Minimum number of special characters” can be

administratively configured.

The password history length can also be administratively configured. The password history specifies the

number of previous passwords in password history to check against for uniqueness to prevent the re-use of

the same passwords.

Password lifetime can be configured for manually set passwords and generated passwords. This option

allows the administrator to set a specific number of days before the password is expired. Once this limit has

been reached, the user is required to change the password the next time they log on to IdentityIQ.

8.3.3 FIA_USB.1:

After a user authenticates to the TOE, the TOE creates a user session in memory that contains the

authenticated username, the user’s principal, and the capabilities, rights, and dynamic scopes that have

been associated with that user’s principal. This user session is also associated with J2EE session identifier

maintained by Apache Tomcat which hosts IdentityIQ's GUI. The principal is the unique identifier that

IdentityIQ uses for a user throughout the enterprise. An authenticated username within the user store

(Active Directory or IdentityIQ) will be assigned to the user’s principal. The principal is then used to

query the Oracle database for the capabilities, rights and dynamic scope for that user. The dynamic scope

defines the GUI webpages to which the user has access. Capabilities and rights are discussed in more

depth in section 8.4.1.

User actions are authorized against the user session stored in IdentityIQ's memory. A user's session will

not be updated to include any changes to their security attributes while they are authenticated to

IdentityIQ. Instead, changes made to a user’s security attributes will be reflected upon the user's next

authentication attempt.

8.4 Security Management

8.4.1 FMT_MOF.1:

The ability for a user to perform a function on an object through IdentityIQ is dependent on the

capabilities, rights, and scope associated with the user. Roles in the context of IdentityIQ are the

combination of “capabilities” and “rights”. The “capabilities” control the components within the product

to which a user has access. The “rights” are actions that the user can perform on the target attribute and

are assigned to capabilities. Examples of rights include create, read, update, delete, execute. The “scope”

defines the objects to which a user has access. IdentityIQ will query the Oracle database for data based on

user actions and will only provide the user access to data objects within their assigned scope. Scope is

referred to in two ways, Assigned scope and Controlled scope. Assigned scope is the scope assigned to

an identity or object manually, automatically, or through aggregation and correlation. Controlled scopes

Page 41: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

40 | P a g e

Booz Allen Hamilton – CATL / SailPoint

refer to the scopes to which an identity has access. A user can only see objects that are within their

controlled scopes, that were created, or that have no scope assigned. Controlled scope is hierarchical. If a

user controls a parent scope they control any child scopes contained within.

The System Admin has full access to objects and every right within IdentityIQ. This is the only default

capability that has this access. Refer to Table 6-3 for the modification of TOE data by the defined

capabilities within the context of this ST.

8.4.2 FMT_MTD.1:

Table 6-4 describes the ability to query, modify and delete usernames, passwords and Security

Questions/Answers. Any authenticated user has the ability to query and change their own password and

Security Questions/Answers. SysAdmins and Managers have the ability to query, modify, and delete a

username, password, and Security Questions/Answers. Any user that has the “Manager” flag set within

their account can perform this function on users that within their hierarchy. Oracle Database 11g is the

repository that the TOE utilizes for authentication data. Secure communications to and from the

repository are secured with TLS using JDBC which is provided by the JRE and is part of the Operational

Environment.

8.4.3 FMT_SMF.1:

For each of the security functions that are defined as part of the TSF, the TOE provides administrators

with the capability to manage the function. Additionally, provisioning occurs automatically once the

initial configuration of the TOE has been completed. For instance, the transmission/provisioning of user

data to the environment occurs immediately following the creation or modification of the data by an

Administrator. The transmission of data is sent through a secure channel protected by TLS. Table 6-3 lists

all of the management functions for each requirement.

8.4.4 FMT_SMR.1:

The TOE allows the administrators, as defined in Table 6-3 under FMT_SMR.1, to assign users to

capabilities. IdentityIQ has 27 out-of-the-box capabilities (capabilities, in this instance are synonymous

with the protection profile’s definition of roles.). These capabilities already have rights assigned to them.

Admins with the proper capability can modify any out-of-the-box capability by adding or removing the

rights assigned thus creating a custom capability. Administrators also have the ability to delete

capabilities. The System Admin is a unique capability as it has all of the rights that are available already

assigned. Refer to AGD documentation, specifically, SailPoint_IdentityIQ_Capabilities.xls [16] for a

complete list of out-of-the-box capabilities and the rights that are assigned to them.

8.5 Protection of the TSF

8.5.1 FPT_APW_EXT.1:

Users of the TOE are required to authenticate to IdentityIQ with a username and password. IdentityIQ

does not store the password credential locally nor does the TOE provide any mechanism for users to read

plaintext passwords. IdentityIQ's user store is an environmental Oracle 11g database. The TOE requests

the JRE to encrypt the user's password using AES-128 with Base64 encoding to protect IdentityIQ

passwords before being stored in the Oracle database.

Page 42: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

41 | P a g e

Booz Allen Hamilton – CATL / SailPoint

8.5.2 FPT_SKP_EXT.1:

In the evaluated configuration, IdentityIQ does not store or have access to any pre-shared keys, symmetric

keys, or private keys. IdentityIQ does have a symmetric key which is hardcoded into the TOE’s software,

which can be provided to the JRE for encrypting and decrypting IdentityIQ managed user passwords and

answers to user security questions. However, in the evaluated configuration, the TOE’s installer will

import a unique symmetric key into the JRE’s keystore for this purpose. The Operational Environment

JRE would then use this unique symmetric key to encrypt and decrypt this user data using AES-128 with

Base64 encoding before storing it in the Oracle database. IdentityIQ does not provide any interface to

read the hardcoded key nor any key stored in the JRE keystore.

8.6 TOE Access

8.6.1 FTA_SSL.3:

IdentityIQ has the ability to terminate a user’s remote administrative GUI session if the session is inactive

for a specific period of time as configured by the System Admin that installs the TOE. The default

timeout setting is 30 minutes. For the System Admin to configure inactivity timeout value, they would

need to modify the web.xml file. The value can be set between 1 and 1440 minutes.

8.6.2 FTA_SSL.4:

Any user can terminate his or her remote session using the logout button displayed within the GUI

session.

8.6.3 FTA_TAB.1:

The TOE displays a warning message on the GUI's login page prior to allowing any user authentication to

the TOE. This requires the System Admin that installs the TOE to modify the login page (login.xhtml) to

include the warning message.

8.7 Trusted Path/Channels

8.7.1 FTP_ITC.1:

IdentityIQ connects to Active Directory in order to perform authentication of enterprise users and

administrative users to IdentityIQ. This connection occurs over a TLS protected channel between the

environmental JRE's JNDI and the environmental Active Directory server.

IdentityIQ also connects to Active Directory servers to perform compliance checks (also known as

"certifications") by reading the enforced policies and enterprise user data that is stored within Active

Directory as well as to perform provisioning by writing updates to this data on the Active Directory. This

connection occurs over a TLS protected channel between the Microsoft .NET Framework's ADSI

connector and the Active Directory server in the Operational Environment.

IdentityIQ connects to the Oracle Database to store policy data, enterprise user data and IdentityIQ

administrator data. This connection occurs over a TLS protected channel between the environmental

JRE's JDBC and the environmental Oracle database.

Page 43: SailPoint - niap-ccevs.org · PDF file5.1 Extended Security Functional Requirements ..... 20 5.2 Extended Security Assurance Requirements ... [14] SailPoint IdentityIQ Direct Connectors

Security Target SailPoint IdentityIQ

42 | P a g e

Booz Allen Hamilton – CATL / SailPoint

In all cases, the encryption is provided by the Operational Environment using the following FIPS 140-2

certified cryptographic modules:

RSA BSAFE Crypto-J JSAFE and JCE are used for the JNDI and JDBC connections.

o Version 6.1 – cert #2057/#2058

o Version 6.0 – cert #1785/#1786 (JRE 6 only)

Microsoft Windows Cryptographic Primitives Library (BCRYPTPRIMITIVES.DLL/CNG.SYS)

is used for the ADSI connection.

o Cert #1892

IdentityIQ initiates all communication via the trusted channel. The environmental JREs JNDI and the

environmental Active Directory server channel is initiated on a per authentication request. The

environmental Microsoft .NET Framework's ADSI and the environmental Active Directory server

channel is initiated on a compliance or provisioning event basis which can occur immediately after

administrative action. The environmental JRE's JDBC and the environmental Oracle Database channel is

initiated as part of IdentityIQ's start-up process and is a continuous connection since IdentityIQ cannot

operate without the TOE data stored in the Oracle database. If the connection is severed, IdentityIQ will

re-establish the connection.

8.7.2 FTP_TRP.1:

IdentityIQ provides a GUI for remote administration. The GUI communication is protected by HTTPS

through an environmental Apache Tomcat with the OpenSSL module. Apache Tomcat uses the OpenSSL

FIPS Object Module with one of the following versions: 2.0, 2.0.1 through 2.0.7. This module has been

FIPS validated, certificate #1747.

Users initiate access to the GUI by directing their web browser to https://hostserver:8443/identityiq using

Internet Explorer, version 10. This trusted path is used for all remote administration.


Recommended